2019-11-18T07:22:00Z

What is your primary use case for Fortinet FortiNAC?

Julia Miller - PeerSpot reviewer
  • 0
  • 294
PeerSpot user
27

27 Answers

Charity Kimotho - PeerSpot reviewer
Real User
Top 5
2024-02-21T12:01:00Z
Feb 21, 2024

We use Fortinet FortiNAC for visibility and control.

Search for a product comparison
SM
Real User
Top 5Leaderboard
2024-01-16T12:11:00Z
Jan 16, 2024

We use Fortinet FortiNAC to control user access and enforce system policies.

Heson Ko - PeerSpot reviewer
Reseller
Top 10
2024-01-05T08:10:00Z
Jan 5, 2024

It is mainly used by clients in the healthcare sector. In certain instances, the solution is implemented to address specific scenarios involving the deployment of devices within the IT infrastructure.

Kitsana Saengphet - PeerSpot reviewer
Reseller
Top 10
2023-07-17T06:47:52Z
Jul 17, 2023

We use Fortinet FortiNAC for network access and identity protection.

ClaudeMualuko - PeerSpot reviewer
Real User
Top 5
2023-07-12T12:42:17Z
Jul 12, 2023

We use the solution for network access control and endpoint profiling.

ClaudeMualuko - PeerSpot reviewer
Real User
Top 5
2023-06-15T13:01:00Z
Jun 15, 2023

We used it for network access control of internal users on wired networks, as well as to enforce USB port blocking. Some complaints were directed to me, and that was the primary use case.

Learn what your peers think about Fortinet FortiNAC. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
BO
Real User
Top 5Leaderboard
2023-06-13T13:43:00Z
Jun 13, 2023

We use the solution as a firewall to protect the network.

Bruno Moreira - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-05-09T15:49:00Z
May 9, 2023

Fortinet FortiNAC is very easy to use, and we can run the proof of concept in one day. The main part of the configuration is to create the policies. We can present more of the solution and protect more clients with it.

Ubeyd  Kara - PeerSpot reviewer
Real User
Top 10
2023-04-20T14:59:26Z
Apr 20, 2023

We use this solution to control the network.

Olajide Olusegun - PeerSpot reviewer
MSP
Top 5Leaderboard
2023-02-09T14:39:00Z
Feb 9, 2023

Fortinet FortiNAC is a network address control solution that we use as an identity and access management server. We integrate it with network devices and workstations to create policies and privileges for network access and device management. It also performs posture checks on Windows workstations to ensure compliance with security policies before granting network access. Essentially, it profiles endpoints and workstations, and checks for security compliance (such as updated patches, enabled firewall, and vulnerability compliance) before granting network access.

AM
Real User
Top 20
2022-10-20T20:05:00Z
Oct 20, 2022

Our customers are from the security and financial services industries. FortiNAC is a network access control. In banking systems and in terminals, we need to manage VLAN and receive reports like IBS and IDS. Every VLAN has specific information to share some, but not all, of the files, because there are restrictions in the banking and financial systems.

Mouzong Francis - PeerSpot reviewer
Real User
Top 5
2022-10-03T17:01:45Z
Oct 3, 2022

I use FortiNAC to limit access to our network; it's our firewall. We are customers of Fortinet and I'm a technical manager.

Boller -Anyiine - PeerSpot reviewer
Real User
Top 5
2022-09-06T11:56:00Z
Sep 6, 2022

The primary use case is for the visibility of the entire network architecture. It provides visibility to the switches, and routers to see the domain users, contractors, and guest users. It provides network access control, to be able to tell what endpoints are running on the machine, and what windows updates are on the machine. It is also used for cyber threat control.

Boniphace Mkindi - PeerSpot reviewer
Real User
Top 20
2022-07-21T23:15:00Z
Jul 21, 2022

The customer required centralizing control to control access, detection, and network control. He requested processing a simple management point, the access, the devices, and distribution, and wanted to manage all the customer devices. He had a history of working with FortiNAC devices and wanted us to do the same. So I installed the product to understand it.

AB
Real User
Top 5
2022-07-05T14:36:00Z
Jul 5, 2022

We use this solution for network access control to ensure that access into our environment, especially our endpoints, is controlled. We have 23 sites in different geographic locations, so we want to make sure that a person can't just sneak into a branch, plug in a device, and connect to the network. We also want to reduce the risk of connecting endpoints that have vulnerabilities, for an added layer of protection. If you're missing patches of security, you basically have no firewall because those are potential entry points for attackers. We want to control and manage them from a central point so that, if there are any potentially hazardous connections, we are able to block the user but also remediate in the case of Microsoft updates or if updates are missing on their PC.

Pavel Zhuykov - PeerSpot reviewer
Real User
Top 10
2022-05-31T01:00:49Z
May 31, 2022

I have used Fortinet FortiNAC in medium-sized banks, offices, campuses, and distribution networks for control.

Saumya Jain - PeerSpot reviewer
Real User
2022-04-25T09:36:41Z
Apr 25, 2022

We use the solution for VPN. I'm a product manager and we are customers of Fortinet.

Real User
2022-02-23T19:16:53Z
Feb 23, 2022

I was a distributor and system integrator of FortiNAC. We were opening a lot of tickets and there were lots of bugs, so I replaced it with Forescout very easily. Within two days, I replaced everything. With FortiNAC, I was just doing the implementation, making things work properly, and beginning testing after five days. FortiNAC is deployed on-prem. They're not major enough to be on cloud. Even on-prem is not doing good.

Eranjaya-Kumarasiri - PeerSpot reviewer
Reseller
2022-02-15T07:54:33Z
Feb 15, 2022

We use Fortinet FortiNAC to receive excellent visibility of our network for traffic and what devices are connected to prevent attacks.

Ahmet Coruk - PeerSpot reviewer
Real User
2022-01-19T14:50:20Z
Jan 19, 2022

We installed Fortinet FortiNAC in a large company in a VM environment. They have a lot of end-users and complex user account needs. For example, some of the VIPs and different guests all need different access permissions and some of them are connected through the Active Directory credentials which we have to have a portal page for them to gain access. Another layer of complexity is different users are receiving accounts from many departments. For example, the customer's IT department gives them access and they send the credentials to the guest by email. The IT department can limit their account in different ways, such as only allowing the account access for a period of time.

JF
Real User
2020-11-03T06:58:53Z
Nov 3, 2020

Our customers use it for micro-segmentation in the network and authentication. We typically install this solution for medium-sized companies.

MB
Real User
2020-04-30T10:58:55Z
Apr 30, 2020

We are a solution provider and this is one of the products that we implement for our clients.

AM
Real User
Top 20
2020-04-26T06:32:39Z
Apr 26, 2020

We are a solution provider and this is one of the products that we implement for our customers. It is used as part of the network security and protects our clients.

MA
Real User
2020-04-26T06:32:39Z
Apr 26, 2020

We are a solution provider and this is one of the products that we implement for our clients. My role is security and I deal with products to protect data centers. FortiNAC makes up part of the security solution in a data center.

BA
Real User
2020-04-02T07:00:12Z
Apr 2, 2020

I was certified in FortiNAC (Part of Fortinet-NSE6) last year and I've personally implemented FortiNAC in three organizations. We work as a team with people who have expertise in different areas and Vendors and have exposure to different infrastructures. FortiNAC scans your network to discover every user, application, and device (IOT), With up to 18 different techniques, it can then profile each element based on observed characteristics and responses for granular visibility - We then apply state-based control(eth0 VLAN switching) and Policy based control rules for access control and response. Anyone (Domain users, Contractors, guests, etc) wanting to connect to the network has to be accessed by the NAC. Users come in at different times and some may be working from branches or home through a VPN and they will be authenticated in the same way with different privileges on the Network. So it has to run 24/7. It's authenticating users all the time. We are gold partners with FortiNac.

RS
Real User
2020-02-20T06:38:00Z
Feb 20, 2020

The solution is generally used for compliance and other related items such as network visibility.

AF
Reseller
2019-11-18T07:22:00Z
Nov 18, 2019

I'm a senior network architect and our company is a reseller of FortiNAC. This is a new product for me and we'll be starting implementation shortly. We've been testing the product and I'm just finishing the course. I'll be implementing for our client which is a medium-size company.

Fortinet's FortiNAC is a network access control solution that provides visibility, control, and automated response for everything that connects to the network, enhancing the security fabric. FortiNAC protects against Internet of Things (IoT) threats, extends control to third-party devices, and orchestrates automated responses to a variety of networking events. Using many information and behavior sources, FortiNAC delivers extensive profiling of even headless devices on your network, allowing...
Download Fortinet FortiNAC ReportRead more